Sciweavers

3651 search results - page 560 / 731
» Data Mining for Security Applications
Sort
View
162
Voted
ICIAP
2005
ACM
16 years 5 months ago
Analyzing TCP Traffic Patterns Using Self Organizing Maps
The continuous evolution of the attacks against computer networks has given renewed strength to research on anomaly based Intrusion Detection Systems, capable of automatically dete...
Stefano Zanero
148
Voted
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
16 years 2 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
153
Voted
SDM
2009
SIAM
162views Data Mining» more  SDM 2009»
16 years 2 months ago
Link Propagation: A Fast Semi-supervised Learning Algorithm for Link Prediction.
We propose Link Propagation as a new semi-supervised learning method for link prediction problems, where the task is to predict unknown parts of the network structure by using aux...
Hisashi Kashima, Tsuyoshi Kato, Yoshihiro Yamanish...
141
Voted
SDM
2009
SIAM
113views Data Mining» more  SDM 2009»
16 years 2 months ago
Graph Generation with Prescribed Feature Constraints.
In this paper, we study the problem of how to generate synthetic graphs matching various properties of a real social network with two applications, privacy preserving social netwo...
Xiaowei Ying, Xintao Wu
WISE
2009
Springer
16 years 2 months ago
Clustering of Social Tagging System Users: A Topic and Time Based Approach
Abstract. Under Social Tagging Systems, a typical Web 2.0 application, users label digital data sources by using freely chosen textual descriptions (tags). Mining tag information r...
Vassiliki A. Koutsonikola, Athena Vakali, Eirini G...